Track: Technical Author: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS Flying at 40,000 feet above the ground always gives one a sense of clarity. Looking down on the world from such a height can make a person feel somewhat insignificant. However, my trip today is very noteworthy. I will be landing...
Author: NSFOCUS
NSFOCUS Appoints Industry Veteran Jason Yuan as New VP, Product Management and Product Development
SANTA CLARA, Calif. – January 14, 2016 – NSFOCUS IB today announced that industry veteran Jason Yuan has been appointed as the new VP, Product Management and Product Development. Mr. Yuan brings more than 20 years’ experience to his new role, encompassing previous high-level positions in security, networking, cloud and...
Carlos Cabello to Oversee International Operations for NSFOCUS IB
SANTA CLARA, Calif. – January 5, 2016 – NSFOCUS IB today announced that management veteran Carlos Cabello has been appointed as the new VP for International Business Operations. Mr. Cabello has more than a 20-year history of progressive and results-oriented experience in this broad-ranging field, complete with profit-and-loss responsibilities. His...
Anatomy of an attack: network bandwidth exhaustion
Track: Technical Author: Vann Abernethy, Field CTO, NSFOCUS DDoS attacks come in three basic flavors: network-layer, application-layer and a hybrid of the two. This is a somewhat simplistic view but when you look at the strategy for taking someone down via DDoS, the two primary vehicles are either exhaustion of available...
DDoS attacks – more than just disruption?
Track: General Security Author: Vann Abernethy, Field CTO, NSFOCUS Distributed Denial-of-Service (DDoS) attacks have been around for decades and have been increasing in popularity due to the relative ease in carrying one out. Traditionally, the purpose of these attacks has been to make a site or service unavailable to its intended...
Anatomy of an attack – DNS amplification
Track: Technical Author: Vann Abernethy, Field CTO, NSFOCUS DNS amplification attacks ramp up the power of a botnet when targeting a victim. The basic technique of a DNS amplification attack is to spoof the IP of the intended target and send a request for a large DNS zone file to any...





